From 5f8de423f190bbb79a62f804151bc24824fa32d8 Mon Sep 17 00:00:00 2001 From: "Matt A. Tobin" Date: Fri, 2 Feb 2018 04:16:08 -0500 Subject: Add m-esr52 at 52.6.0 --- .../http-http/img-tag/generic.keep-origin-redirect.http.html.ini | 8 ++++++++ .../http-http/img-tag/generic.no-redirect.http.html.ini | 8 ++++++++ .../http-http/img-tag/generic.swap-origin-redirect.http.html.ini | 8 ++++++++ .../http-https/img-tag/generic.keep-origin-redirect.http.html.ini | 8 ++++++++ .../http-https/img-tag/generic.no-redirect.http.html.ini | 8 ++++++++ .../http-https/img-tag/generic.swap-origin-redirect.http.html.ini | 8 ++++++++ .../http-http/img-tag/generic.keep-origin-redirect.http.html.ini | 8 ++++++++ .../http-http/img-tag/generic.no-redirect.http.html.ini | 8 ++++++++ .../http-http/img-tag/generic.swap-origin-redirect.http.html.ini | 8 ++++++++ .../http-https/img-tag/generic.keep-origin-redirect.http.html.ini | 8 ++++++++ .../http-https/img-tag/generic.no-redirect.http.html.ini | 8 ++++++++ .../http-https/img-tag/generic.swap-origin-redirect.http.html.ini | 8 ++++++++ .../http-csp/cross-origin/http-http/img-tag/__dir__.ini | 1 + .../http-csp/cross-origin/http-https/img-tag/__dir__.ini | 1 + .../unsafe-url/http-csp/same-origin/http-http/img-tag/__dir__.ini | 1 + .../http-csp/same-origin/http-https/img-tag/__dir__.ini | 1 + .../http-http/img-tag/generic.keep-origin-redirect.http.html.ini | 8 ++++++++ .../http-http/img-tag/generic.no-redirect.http.html.ini | 8 ++++++++ .../http-http/img-tag/generic.swap-origin-redirect.http.html.ini | 8 ++++++++ .../http-https/img-tag/generic.keep-origin-redirect.http.html.ini | 8 ++++++++ .../http-https/img-tag/generic.no-redirect.http.html.ini | 8 ++++++++ .../http-https/img-tag/generic.swap-origin-redirect.http.html.ini | 8 ++++++++ .../http-http/img-tag/generic.keep-origin-redirect.http.html.ini | 8 ++++++++ .../http-http/img-tag/generic.no-redirect.http.html.ini | 8 ++++++++ .../http-http/img-tag/generic.swap-origin-redirect.http.html.ini | 8 ++++++++ .../http-https/img-tag/generic.keep-origin-redirect.http.html.ini | 8 ++++++++ .../http-https/img-tag/generic.no-redirect.http.html.ini | 8 ++++++++ .../http-https/img-tag/generic.swap-origin-redirect.http.html.ini | 8 ++++++++ .../meta-csp/cross-origin/http-http/img-tag/__dir__.ini | 1 + .../meta-csp/cross-origin/http-https/img-tag/__dir__.ini | 1 + .../unsafe-url/meta-csp/same-origin/http-http/img-tag/__dir__.ini | 1 + .../meta-csp/same-origin/http-https/img-tag/__dir__.ini | 1 + .../meta-referrer/cross-origin/http-http/img-tag/__dir__.ini | 1 + .../meta-referrer/cross-origin/http-https/img-tag/__dir__.ini | 1 + .../meta-referrer/same-origin/http-http/img-tag/__dir__.ini | 1 + .../meta-referrer/same-origin/http-https/img-tag/__dir__.ini | 1 + 36 files changed, 204 insertions(+) create mode 100644 testing/web-platform/meta/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html.ini create mode 100644 testing/web-platform/meta/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/generic.no-redirect.http.html.ini create mode 100644 testing/web-platform/meta/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html.ini create mode 100644 testing/web-platform/meta/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html.ini create mode 100644 testing/web-platform/meta/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/generic.no-redirect.http.html.ini create mode 100644 testing/web-platform/meta/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html.ini create mode 100644 testing/web-platform/meta/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html.ini create mode 100644 testing/web-platform/meta/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/generic.no-redirect.http.html.ini create mode 100644 testing/web-platform/meta/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html.ini create mode 100644 testing/web-platform/meta/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html.ini create mode 100644 testing/web-platform/meta/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/generic.no-redirect.http.html.ini create mode 100644 testing/web-platform/meta/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html.ini create mode 100644 testing/web-platform/meta/referrer-policy/unsafe-url/http-csp/cross-origin/http-http/img-tag/__dir__.ini create mode 100644 testing/web-platform/meta/referrer-policy/unsafe-url/http-csp/cross-origin/http-https/img-tag/__dir__.ini create mode 100644 testing/web-platform/meta/referrer-policy/unsafe-url/http-csp/same-origin/http-http/img-tag/__dir__.ini create mode 100644 testing/web-platform/meta/referrer-policy/unsafe-url/http-csp/same-origin/http-https/img-tag/__dir__.ini create mode 100644 testing/web-platform/meta/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html.ini create mode 100644 testing/web-platform/meta/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/generic.no-redirect.http.html.ini create mode 100644 testing/web-platform/meta/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html.ini create mode 100644 testing/web-platform/meta/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html.ini create mode 100644 testing/web-platform/meta/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/generic.no-redirect.http.html.ini create mode 100644 testing/web-platform/meta/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html.ini create mode 100644 testing/web-platform/meta/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html.ini create mode 100644 testing/web-platform/meta/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/generic.no-redirect.http.html.ini create mode 100644 testing/web-platform/meta/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html.ini create mode 100644 testing/web-platform/meta/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html.ini create mode 100644 testing/web-platform/meta/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/generic.no-redirect.http.html.ini create mode 100644 testing/web-platform/meta/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html.ini create mode 100644 testing/web-platform/meta/referrer-policy/unsafe-url/meta-csp/cross-origin/http-http/img-tag/__dir__.ini create mode 100644 testing/web-platform/meta/referrer-policy/unsafe-url/meta-csp/cross-origin/http-https/img-tag/__dir__.ini create mode 100644 testing/web-platform/meta/referrer-policy/unsafe-url/meta-csp/same-origin/http-http/img-tag/__dir__.ini create mode 100644 testing/web-platform/meta/referrer-policy/unsafe-url/meta-csp/same-origin/http-https/img-tag/__dir__.ini create mode 100644 testing/web-platform/meta/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/img-tag/__dir__.ini create mode 100644 testing/web-platform/meta/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/img-tag/__dir__.ini create mode 100644 testing/web-platform/meta/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/img-tag/__dir__.ini create mode 100644 testing/web-platform/meta/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/img-tag/__dir__.ini (limited to 'testing/web-platform/meta/referrer-policy/unsafe-url') diff --git a/testing/web-platform/meta/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html.ini b/testing/web-platform/meta/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html.ini new file mode 100644 index 000000000..7f7859d2d --- /dev/null +++ b/testing/web-platform/meta/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html.ini @@ -0,0 +1,8 @@ +[generic.keep-origin-redirect.http.html] + type: testharness + expected: + if (os == "linux") and (version == "Ubuntu 16.04"): OK + [The referrer URL is stripped-referrer when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with keep-origin-redirect and when\n the target request is cross-origin.] + expected: + if (os == "linux") and (version == "Ubuntu 16.04"): PASS + diff --git a/testing/web-platform/meta/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/generic.no-redirect.http.html.ini b/testing/web-platform/meta/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/generic.no-redirect.http.html.ini new file mode 100644 index 000000000..8ab124566 --- /dev/null +++ b/testing/web-platform/meta/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/generic.no-redirect.http.html.ini @@ -0,0 +1,8 @@ +[generic.no-redirect.http.html] + type: testharness + expected: + if (os == "linux") and (version == "Ubuntu 16.04"): OK + [The referrer URL is stripped-referrer when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with no-redirect and when\n the target request is cross-origin.] + expected: + if (os == "linux") and (version == "Ubuntu 16.04"): PASS + diff --git a/testing/web-platform/meta/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html.ini b/testing/web-platform/meta/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html.ini new file mode 100644 index 000000000..a70cfac72 --- /dev/null +++ b/testing/web-platform/meta/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html.ini @@ -0,0 +1,8 @@ +[generic.swap-origin-redirect.http.html] + type: testharness + expected: + if (os == "linux") and (version == "Ubuntu 16.04"): OK + [The referrer URL is stripped-referrer when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with swap-origin-redirect and when\n the target request is cross-origin.] + expected: + if (os == "linux") and (version == "Ubuntu 16.04"): PASS + diff --git a/testing/web-platform/meta/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html.ini b/testing/web-platform/meta/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html.ini new file mode 100644 index 000000000..eb9ecf624 --- /dev/null +++ b/testing/web-platform/meta/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html.ini @@ -0,0 +1,8 @@ +[generic.keep-origin-redirect.http.html] + type: testharness + expected: + if (os == "linux") and (version == "Ubuntu 16.04"): OK + [The referrer URL is stripped-referrer when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with keep-origin-redirect and when\n the target request is cross-origin.] + expected: + if (os == "linux") and (version == "Ubuntu 16.04"): PASS + diff --git a/testing/web-platform/meta/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/generic.no-redirect.http.html.ini b/testing/web-platform/meta/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/generic.no-redirect.http.html.ini new file mode 100644 index 000000000..f53a80783 --- /dev/null +++ b/testing/web-platform/meta/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/generic.no-redirect.http.html.ini @@ -0,0 +1,8 @@ +[generic.no-redirect.http.html] + type: testharness + expected: + if (os == "linux") and (version == "Ubuntu 16.04"): OK + [The referrer URL is stripped-referrer when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with no-redirect and when\n the target request is cross-origin.] + expected: + if (os == "linux") and (version == "Ubuntu 16.04"): PASS + diff --git a/testing/web-platform/meta/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html.ini b/testing/web-platform/meta/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html.ini new file mode 100644 index 000000000..fc91fab9f --- /dev/null +++ b/testing/web-platform/meta/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html.ini @@ -0,0 +1,8 @@ +[generic.swap-origin-redirect.http.html] + type: testharness + expected: + if (os == "linux") and (version == "Ubuntu 16.04"): OK + [The referrer URL is stripped-referrer when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with swap-origin-redirect and when\n the target request is cross-origin.] + expected: + if (os == "linux") and (version == "Ubuntu 16.04"): PASS + diff --git a/testing/web-platform/meta/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html.ini b/testing/web-platform/meta/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html.ini new file mode 100644 index 000000000..379fd52a2 --- /dev/null +++ b/testing/web-platform/meta/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html.ini @@ -0,0 +1,8 @@ +[generic.keep-origin-redirect.http.html] + type: testharness + expected: + if (os == "linux") and (version == "Ubuntu 16.04"): OK + [The referrer URL is stripped-referrer when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with keep-origin-redirect and when\n the target request is same-origin.] + expected: + if (os == "linux") and (version == "Ubuntu 16.04"): PASS + diff --git a/testing/web-platform/meta/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/generic.no-redirect.http.html.ini b/testing/web-platform/meta/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/generic.no-redirect.http.html.ini new file mode 100644 index 000000000..49b18332b --- /dev/null +++ b/testing/web-platform/meta/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/generic.no-redirect.http.html.ini @@ -0,0 +1,8 @@ +[generic.no-redirect.http.html] + type: testharness + expected: + if (os == "linux") and (version == "Ubuntu 16.04"): OK + [The referrer URL is stripped-referrer when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with no-redirect and when\n the target request is same-origin.] + expected: + if (os == "linux") and (version == "Ubuntu 16.04"): PASS + diff --git a/testing/web-platform/meta/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html.ini b/testing/web-platform/meta/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html.ini new file mode 100644 index 000000000..d0d8de25d --- /dev/null +++ b/testing/web-platform/meta/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html.ini @@ -0,0 +1,8 @@ +[generic.swap-origin-redirect.http.html] + type: testharness + expected: + if (os == "linux") and (version == "Ubuntu 16.04"): OK + [The referrer URL is stripped-referrer when a\n document served over http requires an http\n sub-resource via img-tag using the attr-referrer\n delivery method with swap-origin-redirect and when\n the target request is same-origin.] + expected: + if (os == "linux") and (version == "Ubuntu 16.04"): PASS + diff --git a/testing/web-platform/meta/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html.ini b/testing/web-platform/meta/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html.ini new file mode 100644 index 000000000..a6b2b838d --- /dev/null +++ b/testing/web-platform/meta/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html.ini @@ -0,0 +1,8 @@ +[generic.keep-origin-redirect.http.html] + type: testharness + expected: + if (os == "linux") and (version == "Ubuntu 16.04"): OK + [The referrer URL is stripped-referrer when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with keep-origin-redirect and when\n the target request is same-origin.] + expected: + if (os == "linux") and (version == "Ubuntu 16.04"): PASS + diff --git a/testing/web-platform/meta/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/generic.no-redirect.http.html.ini b/testing/web-platform/meta/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/generic.no-redirect.http.html.ini new file mode 100644 index 000000000..9482b2000 --- /dev/null +++ b/testing/web-platform/meta/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/generic.no-redirect.http.html.ini @@ -0,0 +1,8 @@ +[generic.no-redirect.http.html] + type: testharness + expected: + if (os == "linux") and (version == "Ubuntu 16.04"): OK + [The referrer URL is stripped-referrer when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with no-redirect and when\n the target request is same-origin.] + expected: + if (os == "linux") and (version == "Ubuntu 16.04"): PASS + diff --git a/testing/web-platform/meta/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html.ini b/testing/web-platform/meta/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html.ini new file mode 100644 index 000000000..bba8202ce --- /dev/null +++ b/testing/web-platform/meta/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html.ini @@ -0,0 +1,8 @@ +[generic.swap-origin-redirect.http.html] + type: testharness + expected: + if (os == "linux") and (version == "Ubuntu 16.04"): OK + [The referrer URL is stripped-referrer when a\n document served over http requires an https\n sub-resource via img-tag using the attr-referrer\n delivery method with swap-origin-redirect and when\n the target request is same-origin.] + expected: + if (os == "linux") and (version == "Ubuntu 16.04"): PASS + diff --git a/testing/web-platform/meta/referrer-policy/unsafe-url/http-csp/cross-origin/http-http/img-tag/__dir__.ini b/testing/web-platform/meta/referrer-policy/unsafe-url/http-csp/cross-origin/http-http/img-tag/__dir__.ini new file mode 100644 index 000000000..36f10d916 --- /dev/null +++ b/testing/web-platform/meta/referrer-policy/unsafe-url/http-csp/cross-origin/http-http/img-tag/__dir__.ini @@ -0,0 +1 @@ +disabled: https://github.com/w3c/web-platform-tests/issues/1874 diff --git a/testing/web-platform/meta/referrer-policy/unsafe-url/http-csp/cross-origin/http-https/img-tag/__dir__.ini b/testing/web-platform/meta/referrer-policy/unsafe-url/http-csp/cross-origin/http-https/img-tag/__dir__.ini new file mode 100644 index 000000000..36f10d916 --- /dev/null +++ b/testing/web-platform/meta/referrer-policy/unsafe-url/http-csp/cross-origin/http-https/img-tag/__dir__.ini @@ -0,0 +1 @@ +disabled: https://github.com/w3c/web-platform-tests/issues/1874 diff --git a/testing/web-platform/meta/referrer-policy/unsafe-url/http-csp/same-origin/http-http/img-tag/__dir__.ini b/testing/web-platform/meta/referrer-policy/unsafe-url/http-csp/same-origin/http-http/img-tag/__dir__.ini new file mode 100644 index 000000000..36f10d916 --- /dev/null +++ b/testing/web-platform/meta/referrer-policy/unsafe-url/http-csp/same-origin/http-http/img-tag/__dir__.ini @@ -0,0 +1 @@ +disabled: https://github.com/w3c/web-platform-tests/issues/1874 diff --git a/testing/web-platform/meta/referrer-policy/unsafe-url/http-csp/same-origin/http-https/img-tag/__dir__.ini b/testing/web-platform/meta/referrer-policy/unsafe-url/http-csp/same-origin/http-https/img-tag/__dir__.ini new file mode 100644 index 000000000..36f10d916 --- /dev/null +++ b/testing/web-platform/meta/referrer-policy/unsafe-url/http-csp/same-origin/http-https/img-tag/__dir__.ini @@ -0,0 +1 @@ +disabled: https://github.com/w3c/web-platform-tests/issues/1874 diff --git a/testing/web-platform/meta/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html.ini b/testing/web-platform/meta/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html.ini new file mode 100644 index 000000000..44701f40c --- /dev/null +++ b/testing/web-platform/meta/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html.ini @@ -0,0 +1,8 @@ +[generic.keep-origin-redirect.http.html] + type: testharness + expected: + if (os == "linux") and (version == "Ubuntu 16.04"): OK + [The referrer URL is stripped-referrer when a\n document served over http requires an http\n sub-resource via img-tag using the http-rp\n delivery method with keep-origin-redirect and when\n the target request is cross-origin.] + expected: + if (os == "linux") and (version == "Ubuntu 16.04"): PASS + diff --git a/testing/web-platform/meta/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/generic.no-redirect.http.html.ini b/testing/web-platform/meta/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/generic.no-redirect.http.html.ini new file mode 100644 index 000000000..7449b1426 --- /dev/null +++ b/testing/web-platform/meta/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/generic.no-redirect.http.html.ini @@ -0,0 +1,8 @@ +[generic.no-redirect.http.html] + type: testharness + expected: + if (os == "linux") and (version == "Ubuntu 16.04"): OK + [The referrer URL is stripped-referrer when a\n document served over http requires an http\n sub-resource via img-tag using the http-rp\n delivery method with no-redirect and when\n the target request is cross-origin.] + expected: + if (os == "linux") and (version == "Ubuntu 16.04"): PASS + diff --git a/testing/web-platform/meta/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html.ini b/testing/web-platform/meta/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html.ini new file mode 100644 index 000000000..946441b61 --- /dev/null +++ b/testing/web-platform/meta/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html.ini @@ -0,0 +1,8 @@ +[generic.swap-origin-redirect.http.html] + type: testharness + expected: + if (os == "linux") and (version == "Ubuntu 16.04"): OK + [The referrer URL is stripped-referrer when a\n document served over http requires an http\n sub-resource via img-tag using the http-rp\n delivery method with swap-origin-redirect and when\n the target request is cross-origin.] + expected: + if (os == "linux") and (version == "Ubuntu 16.04"): PASS + diff --git a/testing/web-platform/meta/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html.ini b/testing/web-platform/meta/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html.ini new file mode 100644 index 000000000..dff1fb75e --- /dev/null +++ b/testing/web-platform/meta/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html.ini @@ -0,0 +1,8 @@ +[generic.keep-origin-redirect.http.html] + type: testharness + expected: + if (os == "linux") and (version == "Ubuntu 16.04"): OK + [The referrer URL is stripped-referrer when a\n document served over http requires an https\n sub-resource via img-tag using the http-rp\n delivery method with keep-origin-redirect and when\n the target request is cross-origin.] + expected: + if (os == "linux") and (version == "Ubuntu 16.04"): PASS + diff --git a/testing/web-platform/meta/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/generic.no-redirect.http.html.ini b/testing/web-platform/meta/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/generic.no-redirect.http.html.ini new file mode 100644 index 000000000..717b3ad3c --- /dev/null +++ b/testing/web-platform/meta/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/generic.no-redirect.http.html.ini @@ -0,0 +1,8 @@ +[generic.no-redirect.http.html] + type: testharness + expected: + if (os == "linux") and (version == "Ubuntu 16.04"): OK + [The referrer URL is stripped-referrer when a\n document served over http requires an https\n sub-resource via img-tag using the http-rp\n delivery method with no-redirect and when\n the target request is cross-origin.] + expected: + if (os == "linux") and (version == "Ubuntu 16.04"): PASS + diff --git a/testing/web-platform/meta/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html.ini b/testing/web-platform/meta/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html.ini new file mode 100644 index 000000000..e9af06f2f --- /dev/null +++ b/testing/web-platform/meta/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html.ini @@ -0,0 +1,8 @@ +[generic.swap-origin-redirect.http.html] + type: testharness + expected: + if (os == "linux") and (version == "Ubuntu 16.04"): OK + [The referrer URL is stripped-referrer when a\n document served over http requires an https\n sub-resource via img-tag using the http-rp\n delivery method with swap-origin-redirect and when\n the target request is cross-origin.] + expected: + if (os == "linux") and (version == "Ubuntu 16.04"): PASS + diff --git a/testing/web-platform/meta/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html.ini b/testing/web-platform/meta/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html.ini new file mode 100644 index 000000000..0ba25185b --- /dev/null +++ b/testing/web-platform/meta/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html.ini @@ -0,0 +1,8 @@ +[generic.keep-origin-redirect.http.html] + type: testharness + expected: + if (os == "linux") and (version == "Ubuntu 16.04"): OK + [The referrer URL is stripped-referrer when a\n document served over http requires an http\n sub-resource via img-tag using the http-rp\n delivery method with keep-origin-redirect and when\n the target request is same-origin.] + expected: + if (os == "linux") and (version == "Ubuntu 16.04"): PASS + diff --git a/testing/web-platform/meta/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/generic.no-redirect.http.html.ini b/testing/web-platform/meta/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/generic.no-redirect.http.html.ini new file mode 100644 index 000000000..11a77db28 --- /dev/null +++ b/testing/web-platform/meta/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/generic.no-redirect.http.html.ini @@ -0,0 +1,8 @@ +[generic.no-redirect.http.html] + type: testharness + expected: + if (os == "linux") and (version == "Ubuntu 16.04"): OK + [The referrer URL is stripped-referrer when a\n document served over http requires an http\n sub-resource via img-tag using the http-rp\n delivery method with no-redirect and when\n the target request is same-origin.] + expected: + if (os == "linux") and (version == "Ubuntu 16.04"): PASS + diff --git a/testing/web-platform/meta/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html.ini b/testing/web-platform/meta/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html.ini new file mode 100644 index 000000000..f08994b8f --- /dev/null +++ b/testing/web-platform/meta/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html.ini @@ -0,0 +1,8 @@ +[generic.swap-origin-redirect.http.html] + type: testharness + expected: + if (os == "linux") and (version == "Ubuntu 16.04"): OK + [The referrer URL is stripped-referrer when a\n document served over http requires an http\n sub-resource via img-tag using the http-rp\n delivery method with swap-origin-redirect and when\n the target request is same-origin.] + expected: + if (os == "linux") and (version == "Ubuntu 16.04"): PASS + diff --git a/testing/web-platform/meta/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html.ini b/testing/web-platform/meta/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html.ini new file mode 100644 index 000000000..ce46a3cc3 --- /dev/null +++ b/testing/web-platform/meta/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html.ini @@ -0,0 +1,8 @@ +[generic.keep-origin-redirect.http.html] + type: testharness + expected: + if (os == "linux") and (version == "Ubuntu 16.04"): OK + [The referrer URL is stripped-referrer when a\n document served over http requires an https\n sub-resource via img-tag using the http-rp\n delivery method with keep-origin-redirect and when\n the target request is same-origin.] + expected: + if (os == "linux") and (version == "Ubuntu 16.04"): PASS + diff --git a/testing/web-platform/meta/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/generic.no-redirect.http.html.ini b/testing/web-platform/meta/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/generic.no-redirect.http.html.ini new file mode 100644 index 000000000..38b495854 --- /dev/null +++ b/testing/web-platform/meta/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/generic.no-redirect.http.html.ini @@ -0,0 +1,8 @@ +[generic.no-redirect.http.html] + type: testharness + expected: + if (os == "linux") and (version == "Ubuntu 16.04"): OK + [The referrer URL is stripped-referrer when a\n document served over http requires an https\n sub-resource via img-tag using the http-rp\n delivery method with no-redirect and when\n the target request is same-origin.] + expected: + if (os == "linux") and (version == "Ubuntu 16.04"): PASS + diff --git a/testing/web-platform/meta/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html.ini b/testing/web-platform/meta/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html.ini new file mode 100644 index 000000000..3ad4a797a --- /dev/null +++ b/testing/web-platform/meta/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html.ini @@ -0,0 +1,8 @@ +[generic.swap-origin-redirect.http.html] + type: testharness + expected: + if (os == "linux") and (version == "Ubuntu 16.04"): OK + [The referrer URL is stripped-referrer when a\n document served over http requires an https\n sub-resource via img-tag using the http-rp\n delivery method with swap-origin-redirect and when\n the target request is same-origin.] + expected: + if (os == "linux") and (version == "Ubuntu 16.04"): PASS + diff --git a/testing/web-platform/meta/referrer-policy/unsafe-url/meta-csp/cross-origin/http-http/img-tag/__dir__.ini b/testing/web-platform/meta/referrer-policy/unsafe-url/meta-csp/cross-origin/http-http/img-tag/__dir__.ini new file mode 100644 index 000000000..36f10d916 --- /dev/null +++ b/testing/web-platform/meta/referrer-policy/unsafe-url/meta-csp/cross-origin/http-http/img-tag/__dir__.ini @@ -0,0 +1 @@ +disabled: https://github.com/w3c/web-platform-tests/issues/1874 diff --git a/testing/web-platform/meta/referrer-policy/unsafe-url/meta-csp/cross-origin/http-https/img-tag/__dir__.ini b/testing/web-platform/meta/referrer-policy/unsafe-url/meta-csp/cross-origin/http-https/img-tag/__dir__.ini new file mode 100644 index 000000000..36f10d916 --- /dev/null +++ b/testing/web-platform/meta/referrer-policy/unsafe-url/meta-csp/cross-origin/http-https/img-tag/__dir__.ini @@ -0,0 +1 @@ +disabled: https://github.com/w3c/web-platform-tests/issues/1874 diff --git a/testing/web-platform/meta/referrer-policy/unsafe-url/meta-csp/same-origin/http-http/img-tag/__dir__.ini b/testing/web-platform/meta/referrer-policy/unsafe-url/meta-csp/same-origin/http-http/img-tag/__dir__.ini new file mode 100644 index 000000000..36f10d916 --- /dev/null +++ b/testing/web-platform/meta/referrer-policy/unsafe-url/meta-csp/same-origin/http-http/img-tag/__dir__.ini @@ -0,0 +1 @@ +disabled: https://github.com/w3c/web-platform-tests/issues/1874 diff --git a/testing/web-platform/meta/referrer-policy/unsafe-url/meta-csp/same-origin/http-https/img-tag/__dir__.ini b/testing/web-platform/meta/referrer-policy/unsafe-url/meta-csp/same-origin/http-https/img-tag/__dir__.ini new file mode 100644 index 000000000..36f10d916 --- /dev/null +++ b/testing/web-platform/meta/referrer-policy/unsafe-url/meta-csp/same-origin/http-https/img-tag/__dir__.ini @@ -0,0 +1 @@ +disabled: https://github.com/w3c/web-platform-tests/issues/1874 diff --git a/testing/web-platform/meta/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/img-tag/__dir__.ini b/testing/web-platform/meta/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/img-tag/__dir__.ini new file mode 100644 index 000000000..36f10d916 --- /dev/null +++ b/testing/web-platform/meta/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/img-tag/__dir__.ini @@ -0,0 +1 @@ +disabled: https://github.com/w3c/web-platform-tests/issues/1874 diff --git a/testing/web-platform/meta/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/img-tag/__dir__.ini b/testing/web-platform/meta/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/img-tag/__dir__.ini new file mode 100644 index 000000000..36f10d916 --- /dev/null +++ b/testing/web-platform/meta/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/img-tag/__dir__.ini @@ -0,0 +1 @@ +disabled: https://github.com/w3c/web-platform-tests/issues/1874 diff --git a/testing/web-platform/meta/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/img-tag/__dir__.ini b/testing/web-platform/meta/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/img-tag/__dir__.ini new file mode 100644 index 000000000..36f10d916 --- /dev/null +++ b/testing/web-platform/meta/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/img-tag/__dir__.ini @@ -0,0 +1 @@ +disabled: https://github.com/w3c/web-platform-tests/issues/1874 diff --git a/testing/web-platform/meta/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/img-tag/__dir__.ini b/testing/web-platform/meta/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/img-tag/__dir__.ini new file mode 100644 index 000000000..36f10d916 --- /dev/null +++ b/testing/web-platform/meta/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/img-tag/__dir__.ini @@ -0,0 +1 @@ +disabled: https://github.com/w3c/web-platform-tests/issues/1874 -- cgit v1.2.3